Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Monday - Friday, 6-9 a.m.
Hosts Tom Temin and Emily Kopp bring you the latest news affecting the federal community each weekday morning, featuring interviews with top government executives and contractors. Listen live from 6 to 9 a.m. or download archived interviews below.
GAO: Cyber data sharing is lacking
Thursday - 8/19/2010, 8:30am EDT
- The federal government is not living up to private sector expectations for cybersecurity information-sharing. That's according to a new GAO report. More than 9-in-10 survey respondents from the defense, banking and other industries say they expect at least moderate amounts of "timely and actionable cyber threat information". But only 27-percent say they've received it. GAO warns that if things don't improve, the owners of critical infrastructure, like power systems, won't have the information they need to stop catastrophic cyber attacks.
- You can learn more about CyberSecurity in Second Life. The CyberWatch organization, an Advanced Technological Education Center funded by the National Science Foundation, is launching a 3D online virtual environment in Second Life to teach members about cybersecurity issues. The so-called island will feature classrooms, meeting spaces, private and public auditoriums, and information about CyberWatch. The group will also use the virtual environment to conduct workshops and presentations to their members and for the public. Second Life users can access the CyberWatch region using this link: maps.secondlife.com/secondlife/CyberWatch/123/50/23
- If you're looking for Cameron Diaz, Julia Roberts or Jessica Biel online, look out! The movie stars top the latest list of the most dangerous celebrities to search for online, according to new research by computer-security software maker McAfee Inc. It's far from an Oscar, but landing atop McAfee's annual list carries a distinction all its own: It means that criminals believe those celebs are the perfect lures to sucker people into visiting malicious websites. Clicking onto strange sites is sketchy to begin with. But many people do, and their computers get infected. Once a computer is infected, criminals can steal victims' online banking passwords, e-mail passwords, and do other kinds of nasty deeds.
Check out all of Federal News Radio's coverage of cybersecurity issues here.